TWI512528B - Dynamic detection of intelligent devices and methods of the application, and computer program products - Google Patents
Dynamic detection of intelligent devices and methods of the application, and computer program products Download PDFInfo
- Publication number
- TWI512528B TWI512528B TW104100040A TW104100040A TWI512528B TW I512528 B TWI512528 B TW I512528B TW 104100040 A TW104100040 A TW 104100040A TW 104100040 A TW104100040 A TW 104100040A TW I512528 B TWI512528 B TW I512528B
- Authority
- TW
- Taiwan
- Prior art keywords
- application
- smart device
- microprocessor
- functions
- data
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Debugging And Monitoring (AREA)
- Telephone Function (AREA)
Description
本發明有關於智慧型裝置之技術領域,特別有關於一種動態檢測應用程式之智慧型裝置及方法、以及電腦程式產品。The present invention relates to the technical field of smart devices, and more particularly to a smart device and method for dynamically detecting an application, and a computer program product.
智慧型手機已是人們常用的智慧型裝置之一,為了因應人們使用智慧型手機的各項需求,而開發出眾多的應用程式(Application,簡稱app)使智慧型手機具有更多的功能。然而,某些具有惡意或開發疏忽的應用程式會危害智慧型手機的使用或竊取智慧型手機內部的資料,造成使用者使用智慧型手機的困擾或個人資料遭竊用。Smart phones are one of the most popular smart devices. In order to meet the needs of people using smart phones, a number of applications (applications, referred to as app) have been developed to make smart phones more functional. However, some malicious or developmentally negligent applications can jeopardize the use of smart phones or steal information from smart phones, causing users to use smart phones or steal personal data.
為了防範具有惡意或開發疏忽的應用程式會危害智慧型手機的使用或竊取智慧型手機內部的資料,因此提出作為檢測應用程式的系統或工具來進行檢測。目前市面上檢測應用程式的系統或工具係需要該應用程式的原始碼(Source Code)以進行檢測,如果沒有提供應用程式的原始碼則無法進行測試,或者應用程式有提供原始碼,但可能是疏忽或惡意,應用程式經編譯(Compile)完的執行檔會與原本的原始碼有誤差,造成檢測的結果有所誤差;再者,由人工檢測應用程式之原始碼需要花費大量的檢測時間與人力進行檢測,因此檢測的執行率不佳。In order to prevent malicious or inadvertent applications from jeopardizing the use of smart phones or stealing data inside smart phones, a system or tool as a detection application is proposed for detection. The system or tool that currently detects the application on the market requires the source code of the application for detection. If the source code of the application is not provided, the test cannot be performed, or the application provides the source code, but it may be Inadvertent or malicious, the application's compiled (Compile) executable file will be inaccurate with the original source code, resulting in errors in the detection results; in addition, manually detecting the application's source code takes a lot of detection time and Manpower is tested, so the execution rate of the test is not good.
有鑒於上述問題,本發明之目的提供一種動態檢測應用程式之智慧型裝置及方法、以及電腦程式產品,在無需提供應用程式的原始碼情況下,可對應用程式進行檢測,以檢測出會危害智慧型裝置的使用或竊取智慧型裝置內部的資料之具有惡意或開發疏忽的應用程式,且由智慧型裝置檢測應用程式可節省檢測的時間與人力,因此提高檢測的執行率。In view of the above problems, the object of the present invention is to provide a smart device and method for dynamically detecting an application, and a computer program product, which can detect an application to detect a hazard without providing an application source code. The use of smart devices or the use of malicious or inadvertent applications to steal data from smart devices, and the detection of applications by smart devices can save time and manpower for detection, thus increasing the execution rate of detection.
本發明之第一態樣係提供一種動態檢測應用程式之方法,由一智慧型裝置實施該方法,該方法包括下列步驟:開啟該智慧型裝置,由其一微處理器執行該作業系統及一測試程式,以進入檢測應用程式之程序,其中該測試程式安裝在該作業系統的底層;在檢測應用程式之程序中,由該微處理器執行一待測應用程式的所有功能;記錄該待測應用程式的所有功能之執行結果於該智慧型裝置之一記憶體中;由該微處理器從該記憶體中所記錄之執行結果分析出該待測應用程式執行哪些功能、哪些資料被傳送至何處與傳送次數及建立哪些文字檔與資料夾之執行資料;以及由該智慧型裝置之一螢幕顯示該待測應用程式執行哪些功能、哪些資料被傳送至何處與傳送次數及建立哪些文字檔與資料夾之執行資料。A first aspect of the present invention provides a method for dynamically detecting an application, the method being implemented by a smart device, the method comprising the steps of: turning on the smart device, executing the operating system by a microprocessor thereof Testing the program to enter a program for detecting the application, wherein the test program is installed at the bottom of the operating system; in the program for detecting the application, the microprocessor executes all functions of the application to be tested; recording the test The execution result of all the functions of the application is in the memory of the smart device; the execution result recorded by the microprocessor from the memory analyzes which functions are executed by the application under test and which data are transmitted to Where and the number of transmissions and the execution data of which text files and folders are created; and which screen of the smart device displays which functions are executed by the application under test, which data is transmitted to and the number of transmissions, and which text is created File and folder execution data.
本發明之第二態樣係提供一種動態檢測應用程式之智慧型裝置,其包括:一記憶體; 一微處理器,執行該作業系統及一測試程式,以進入檢測應用程式之程序,執行一待測應用程式的所有功能,記錄該待測應用程式的所有功能之執行結果於該記憶體中,將所記錄之執行結果分析出該待測應用程式執行哪些功能、哪些資料被傳送至何處與傳送次數及建立哪些文字檔與資料夾之執行資料,其中該測試程式安裝在該作業系統的底層;以及一螢幕,顯示該待測應用程式執行哪些功能、哪些資料被傳送至何處與傳送次數及建立哪些文字檔與資料夾之執行資料。A second aspect of the present invention provides a smart device for dynamically detecting an application, comprising: a memory; a microprocessor executing the operating system and a test program to enter a program for detecting an application, executing all functions of an application to be tested, and recording execution results of all functions of the application to be tested in the memory, The recorded execution result is analyzed out which functions are executed by the application under test, which data is transmitted to and the number of transmissions, and which text files and folders are executed, wherein the test program is installed at the bottom of the operating system. And a screen showing which functions are executed by the application under test, which data is transmitted to and from the number of transmissions, and which text files and folders are executed.
本發明之第三態樣係提供一種內儲一程式之電腦程式產品,當一智慧型裝置載入該程式並執行後,可完成本發明之第一態樣之方法。The third aspect of the present invention provides a computer program product for storing a program. When a smart device is loaded into the program and executed, the first aspect of the present invention can be completed.
10‧‧‧智慧型手機10‧‧‧Smart mobile phone
12‧‧‧微處理器12‧‧‧Microprocessor
14‧‧‧觸控螢幕14‧‧‧ touch screen
16‧‧‧SD卡16‧‧‧SD card
18‧‧‧傳輸介面18‧‧‧Transport interface
20‧‧‧印表機20‧‧‧Printer
圖1為本發明之動態檢測應用程式之智慧型手機之方塊圖;以及圖2為本發明之動態檢測應用程式之方法之流程圖。1 is a block diagram of a smart phone of a dynamic detection application of the present invention; and FIG. 2 is a flow chart of a method for dynamically detecting an application of the present invention.
為使熟習本發明所屬技術領域之一般技藝者能更進一步了解本發明,下文特列舉本發明之較佳實施例,並配合所附圖式,詳細說明本發明的構成內容及所欲達成之功效。The present invention will be further understood by those of ordinary skill in the art to which the present invention pertains. .
圖1為本發明之動態檢測應用程式之智慧型手機之方塊圖。在圖1中,為智慧型裝置之其中一者之智慧型手機10包括一微處理器12、一觸控螢幕14、為記憶體之其中一者之一SD(Secure Digital)卡16及一傳輸介面18。1 is a block diagram of a smart phone of the dynamic detection application of the present invention. In FIG. 1, the smart phone 10, which is one of the smart devices, includes a microprocessor 12, a touch screen 14, one of the memory, one of the SD (Secure Digital) cards 16 and one transmission. Interface 18.
在作為檢測用之智慧型手機10之SD卡16中儲存有例 如Android或iOS之一作業系統,其底層安裝有用以檢測應用程式之一測試程式。智慧型手機10在開機時,微處理器12執行包括該測試程式之作業系統,以進入檢測應用程式之程序。There is an example stored in the SD card 16 of the smart phone 10 for detection. For example, one of Android or iOS operating systems, the underlying installation is useful to detect one of the application test programs. When the smart phone 10 is turned on, the microprocessor 12 executes an operating system including the test program to enter a program for detecting the application.
微處理器12執行例如APK檔或IPA檔之待測應用程式的所有功能,將該待測應用程式的所有功能之執行結果以檔案形式記錄於SD卡16中。微處理器12將所記錄在SD卡16中之執行結果進行分析,以分析出待測應用程式執行哪些功能、哪些資料被傳送至何處(例如智慧型手機10之內部資料傳送至哪個網址(URL,Uniform Resource Locator))與傳送次數及建立哪些文字檔與資料夾之執行資料。The microprocessor 12 executes all functions of the application to be tested, such as an APK file or an IPA file, and records the execution results of all the functions of the application to be tested in the SD card 16 in the form of a file. The microprocessor 12 analyzes the execution result recorded in the SD card 16 to analyze which functions are executed by the application under test and which materials are transmitted to (for example, to which website the internal data of the smart phone 10 is transmitted ( URL, Uniform Resource Locator)) and the number of transmissions and the execution data of which text files and folders are created.
其中,當微處理器12執行待測應用程式以將智慧型手機10之內部資料傳送至外部網址之裝置時,經由傳輸介面以無線方式傳送智慧型手機10之內部資料至外部網址之裝置。Wherein, when the microprocessor 12 executes the application to be tested to transmit the internal data of the smart phone 10 to the external website, the device internally transmits the internal data of the smart phone 10 to the external website via the transmission interface.
螢幕14顯示由微處理器12所分析之待測應用程式執行哪些功能、哪些資料被傳送至何處與傳送次數及建立哪些文字檔與資料夾之執行資料,以供檢測者觀看檢測結果,根據智慧型手機10之哪些資料被傳送至何處及傳送的次數,以判斷該待測應用程式是否會危害智慧型手機10的使用或竊取智慧型手機10之內部資料。The screen 14 displays which functions are executed by the application to be tested analyzed by the microprocessor 12, which materials are transmitted to and the number of transmissions, and which text files and folders are executed for the tester to view the detection results. The data of the smart phone 10 is transmitted to and from the number of times to determine whether the application to be tested may harm the use of the smart phone 10 or steal the internal data of the smart phone 10.
欲列印出待測應用程式執行哪些功能、哪些資料被傳送至何處與傳送次數及建立哪些文字檔與資料夾之執行資料,微處理器12經由傳輸介面18以有線或無線方式將待測應用程式執行哪些功能、哪些資料被傳送至何處與傳送次數及建立哪些文字檔與資料夾之執行資料傳送至為印表機20之外部裝置,以列印出其資料以供檢測者觀看上述之檢測結果。To print out which functions are to be executed by the application under test, which data is transmitted to and from the number of transmissions, and which text files and folders are executed, the microprocessor 12 will be tested via the transmission interface 18 in a wired or wireless manner. What functions are executed by the application, which data is transferred to and from the number of transmissions, and which text files and folders are executed, and the execution data is transmitted to the external device of the printer 20 to print out the data for the examiner to view. The test results.
圖2為本發明之動態檢測應用程式之方法之流程圖。在說明圖2之流程步驟時參考圖1之組件。2 is a flow chart of a method for dynamically detecting an application of the present invention. Reference is made to the components of Figure 1 in illustrating the process steps of Figure 2.
在圖2中,在作為檢測用之智慧型手機10之SD卡16中儲存有例如Android或iOS之一作業系統,其底層安裝有用以檢測應用程式之測試程式。智慧型手機10在開機時,由微處理器12執行包括該測試程式之作業系統,以進入檢測應用程式之程序(步驟S30)。In FIG. 2, an operating system such as Android or iOS is stored in the SD card 16 as the smart phone 10 for detection, and a test program for detecting an application is installed on the bottom layer. When the smart phone 10 is turned on, the microprocessor 12 executes an operating system including the test program to enter a program for detecting the application (step S30).
由微處理器12執行例如APK檔或IPA檔之待測應用程式的所有功能(步驟S32),將該待測應用程式的所有功能之執行結果以檔案形式記錄於SD卡16中(步驟S34)。All functions of the application to be tested, such as an APK file or an IPA file, are executed by the microprocessor 12 (step S32), and the execution results of all the functions of the application to be tested are recorded in the SD card 16 in the form of an archive (step S34). .
由微處理器12將所記錄在SD卡16中之執行結果進行分析,以分析出待測應用程式執行哪些功能、哪些資料被傳送至何處(例如智慧型手機10之內部資料傳送至哪個網址(URL,Uniform Resource Locator))與傳送次數及建立哪些文字檔與資料夾之執行資料(步驟S36)。The execution result recorded in the SD card 16 is analyzed by the microprocessor 12 to analyze which functions are executed by the application under test and which materials are transmitted to (for example, to which address of the internal data of the smart phone 10 is transmitted) (URL, Uniform Resource Locator)) and the number of transmissions and the execution data of which text files and folders are created (step S36).
例如:[date,time] xxx.apk date/date/abc.mkdir其上表示應用程式xxx.apk建立一資料夾abc.mkdir。例如:[date,time] xxx.apk array[“xxx”,“xxx”] http://URL其上表示陣列字串資料”xxx”傳送到某一網址。For example: [date,time] xxx.apk date/date/abc.mkdir on which the application xxx.apk creates a folder abc.mkdir. For example: [date,time] xxx.apk array["xxx", "xxx"] http://URL indicates that the array string data "xxx" is transmitted to a certain URL.
其中,當微處理器12執行待測應用程式以將智慧型手機10之內部資料傳送至外部網址之裝置時,經由傳輸介面以無線方 式傳送智慧型手機10之內部資料至外部網址之裝置。Wherein, when the microprocessor 12 executes the application to be tested to transmit the internal data of the smart phone 10 to the external website, the wireless interface is transmitted via the transmission interface. A device that transmits internal data of the smart phone 10 to an external website.
由螢幕14顯示由微處理器12所分析之待測應用程式執行哪些功能、哪些資料被傳送至何處與傳送次數及建立哪些文字檔與資料夾之執行資料,以供檢測者觀看檢測結果,根據智慧型手機10之哪些資料被傳送至何處及傳送的次數,以判斷該待測應用程式是否會危害智慧型手機10的使用或竊取智慧型手機10之內部資料(步驟S38)。The screen 14 displays the functions performed by the application to be tested analyzed by the microprocessor 12, which data is transmitted to and the number of transmissions, and which text files and folders are executed for the tester to view the detection result. According to which information of the smart phone 10 is transmitted to and the number of times of transmission, it is judged whether the application to be tested may harm the use of the smart phone 10 or steal the internal data of the smart phone 10 (step S38).
欲列印出待測應用程式執行哪些功能、哪些資料被傳送至何處與傳送次數及建立哪些文字檔與資料夾之執行資料,由微處理器12經由傳輸介面18以有線或無線方式將待測應用程式執行哪些功能、哪些資料被傳送至何處與傳送次數及建立哪些文字檔與資料夾之執行資料傳送至為印表機20之外部裝置,以列印出其資料以供檢測者觀看上述之檢測結果(步驟S40)。To print out which functions are to be executed by the application under test, which information is transmitted to and from the number of transmissions, and which text files and folders are executed, the microprocessor 12 will be wired or wirelessly via the transmission interface 18. Test which functions are executed by the application, which data is transferred to and from the number of transmissions, and which text files and folders are executed to be transmitted to the external device of the printer 20 to print out the data for the examiner to view. The above detection result (step S40).
由智慧型手機10檢測應用程式,並由智慧型手機10根據分析出之待測應用程式的執行資料,以判斷待測應用程式是否會危害智慧型手機10的使用或竊取智慧型手機10之內部資料,無需人工進行判斷,如此可節省檢測應用程式的時間與人力,而提高檢測的執行率。The application is detected by the smart phone 10, and the smart phone 10 analyzes the execution data of the application to be tested to determine whether the application to be tested may harm the use of the smart phone 10 or steal the inside of the smart phone 10. The data does not need to be judged manually, which saves time and manpower for detecting the application and improves the execution rate of the detection.
本發明之上述方法可以內儲一程式之一電腦程式產品來完成,當智慧型手機例如從網路下載該程式並執行後,便可完成如上述說明及圖式中所示之方法步驟。The above method of the present invention can be implemented by storing a computer program product in a program. After the smart phone downloads the program from the network, for example, the method steps shown in the above description and the drawings can be completed.
本發明係提供一種動態檢測應用程式之智慧型裝置及方法、以及電腦程式產品,其優點係在無需提供應用程式的原始碼情況下,可對應用程式進行檢測,以檢測出會危害智慧型裝置的 使用或竊取智慧型裝置內部的資料之具有惡意或開發疏忽的應用程式,且由智慧型裝置檢測應用程式可節省檢測的時間與人力,因此提高檢測的執行率。The present invention provides a smart device and method for dynamically detecting an application, and a computer program product, the advantage of which is that the application can be detected to detect a hazard to the smart device without providing the source code of the application. of A malicious or inadvertent application that uses or steals data inside a smart device, and detecting the application by the smart device can save time and labor for detection, thereby improving the execution rate of the detection.
10‧‧‧智慧型手機10‧‧‧Smart mobile phone
12‧‧‧微處理器12‧‧‧Microprocessor
14‧‧‧觸控螢幕14‧‧‧ touch screen
16‧‧‧SD卡16‧‧‧SD card
18‧‧‧傳輸介面18‧‧‧Transport interface
20‧‧‧印表機20‧‧‧Printer
Claims (9)
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW104100040A TWI512528B (en) | 2015-01-05 | 2015-01-05 | Dynamic detection of intelligent devices and methods of the application, and computer program products |
| US14/967,949 US20160196423A1 (en) | 2015-01-05 | 2015-12-14 | Smart device and method for dynamically detecting applications |
| CN201610004581.5A CN105760760A (en) | 2015-01-05 | 2016-01-05 | Intelligent device and method for dynamically detecting application program and computer program product |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW104100040A TWI512528B (en) | 2015-01-05 | 2015-01-05 | Dynamic detection of intelligent devices and methods of the application, and computer program products |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TWI512528B true TWI512528B (en) | 2015-12-11 |
| TW201626278A TW201626278A (en) | 2016-07-16 |
Family
ID=55407817
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW104100040A TWI512528B (en) | 2015-01-05 | 2015-01-05 | Dynamic detection of intelligent devices and methods of the application, and computer program products |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US20160196423A1 (en) |
| CN (1) | CN105760760A (en) |
| TW (1) | TWI512528B (en) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI617940B (en) * | 2016-12-01 | 2018-03-11 | 財團法人資訊工業策進會 | Data protection method and data protection system |
| CN113626391B (en) * | 2021-08-27 | 2023-04-14 | 四川虹美智能科技有限公司 | Processing method for cache file of operating system |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20130185800A1 (en) * | 2011-12-30 | 2013-07-18 | Perlego Systems, Inc. | Anti-virus protection for mobile devices |
| TW201335785A (en) * | 2012-02-20 | 2013-09-01 | Univ Nat Cheng Kung | Malicious scripts suppression system and suppression method thereof |
| TW201419027A (en) * | 2012-11-05 | 2014-05-16 | Tencent Tech Shenzhen Co Ltd | Method and system for identifying abnormal application program |
| TW201426381A (en) * | 2012-12-26 | 2014-07-01 | Univ Nat Taiwan Science Tech | Method and system for detecting malware applications |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102034050A (en) * | 2011-01-25 | 2011-04-27 | 四川大学 | Dynamic malicious software detection method based on virtual machine and sensitive Native application programming interface (API) calling perception |
| CN102779053A (en) * | 2012-06-18 | 2012-11-14 | 华为终端有限公司 | Method and terminal for starting mobile phone operation system through mobile memory card |
| US9495537B2 (en) * | 2012-08-15 | 2016-11-15 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
| US9319897B2 (en) * | 2012-08-15 | 2016-04-19 | Qualcomm Incorporated | Secure behavior analysis over trusted execution environment |
| CN103064784B (en) * | 2012-11-29 | 2016-01-27 | 福建师范大学 | Towards Xen environment run-time memory leakage detection method and realize system |
| RU2653985C2 (en) * | 2013-06-28 | 2018-05-15 | Закрытое акционерное общество "Лаборатория Касперского" | Method and system for detecting malicious software by control of software implementation running under script |
| CN104182688A (en) * | 2014-08-26 | 2014-12-03 | 北京软安科技有限公司 | Android malicious code detection device and method based on dynamic activation and behavior monitoring |
| CN104217164B (en) * | 2014-09-11 | 2018-02-02 | 工业和信息化部电子第五研究所 | The detection method and device of intelligent mobile terminal Malware |
-
2015
- 2015-01-05 TW TW104100040A patent/TWI512528B/en active
- 2015-12-14 US US14/967,949 patent/US20160196423A1/en not_active Abandoned
-
2016
- 2016-01-05 CN CN201610004581.5A patent/CN105760760A/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20130185800A1 (en) * | 2011-12-30 | 2013-07-18 | Perlego Systems, Inc. | Anti-virus protection for mobile devices |
| TW201335785A (en) * | 2012-02-20 | 2013-09-01 | Univ Nat Cheng Kung | Malicious scripts suppression system and suppression method thereof |
| TW201419027A (en) * | 2012-11-05 | 2014-05-16 | Tencent Tech Shenzhen Co Ltd | Method and system for identifying abnormal application program |
| TW201426381A (en) * | 2012-12-26 | 2014-07-01 | Univ Nat Taiwan Science Tech | Method and system for detecting malware applications |
Also Published As
| Publication number | Publication date |
|---|---|
| TW201626278A (en) | 2016-07-16 |
| US20160196423A1 (en) | 2016-07-07 |
| CN105760760A (en) | 2016-07-13 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN103685251B (en) | A kind of Android malware detection platform towards mobile Internet | |
| TWI541669B (en) | Detection systems and methods for static detection applications, and computer program products | |
| CN104699616B (en) | The method of a kind of application test, Apparatus and system | |
| TWI608416B (en) | Page return method and apparatus, page generation method and apparatus | |
| WO2015188743A1 (en) | Web page vulnerability detection method and apparatus | |
| CN103473509A (en) | Android platform malware automatic detecting method | |
| CN103268328B (en) | The verification method of Quick Response Code and search engine server | |
| US20140157144A1 (en) | Network system | |
| CN112115051A (en) | Page traversal detection method, device and equipment for application and readable storage medium | |
| CN105095090A (en) | Method and device for testing application installation package | |
| WO2016008415A1 (en) | Method and device for acquiring new version information of application software | |
| TWI512528B (en) | Dynamic detection of intelligent devices and methods of the application, and computer program products | |
| CN104202390A (en) | Method and device for downloading online resources and pushing to mobile terminal | |
| CN104778007A (en) | Screen capturing method and screen capturing device | |
| US10397083B2 (en) | Terminal device identification systems, methods, and programs | |
| CN104361007B (en) | The processing method of browser and its collection | |
| CN105809040A (en) | Method and apparatus for detecting application privacy security information | |
| CN103294565B (en) | Method, device and equipment for detecting installed application | |
| CN106649109A (en) | Web testing method and system of intelligent terminal | |
| JP5441043B2 (en) | Program, information processing apparatus, and information processing method | |
| CN104021074A (en) | Vulnerability detection method and device for application program of PhoneGap framework | |
| CN105227351B (en) | Log acquisition system, log acquisition method, and electronic device | |
| CN106959867B (en) | Method and system for monitoring application program uninstallation | |
| CN104572450B (en) | A kind of method and device for detecting resource distribution | |
| CN112149033B (en) | Method and device for acquiring H5 page control, electronic equipment and storage medium |